68 research outputs found

    Esquemas de retransmissão baseados no protocolo decodifica-e-encaminha em redes cognitivas do tipo underlay

    Get PDF
    Orientador: José Cândido Silveira Santos FilhoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de ComputaçãoResumo: O conceito de compartilhamento de espectro do tipo underlay tem sido proposto como uma técnica promissora para contornar o problema da escassez e da subutilização do espectro, permitindo que usuários não licenciados, chamados de usuários secundários, possam acessar simultaneamente uma banda licenciada, alocada aos usuários primários, desde que o nível de interferência sobre os mesmos seja mantido abaixo de um dado limiar aceitável. Entretanto, isso implica que a potência de transmissão na rede secundária deve ser restringida, comprometendo assim a confiabilidade e a cobertura da comunicação. A fim de contornar esse problema, técnicas de retransmissão cooperativa, as quais proveem um novo tipo de diversidade espacial, podem ser exploradas como um meio eficaz para melhorar o desempenho da rede secundária. De fato, a utilização conjunta de ambas as técnicas ¿ compartilhamento de espectro do tipo underlay e retransmissão cooperativa ¿ em redes cooperativas e cognitivas tem recebido especial atenção, já que a eficiência espectral do sistema e o desempenho da rede secundária podem ser melhorados significativamente. Esta tese apresenta quatro contribuições principais na referida área. Em particular, estuda-se o efeito conjunto de duas restrições de potência importantes sobre o desempenho de outage de redes cooperativas e cognitivas, especificamente, o nível máximo de potência interferente tolerada pelo receptor primário e o valor máximo de potência transmitida nos usuários secundários. Foca-se em esquemas de retransmissão baseados no protocolo decodifica-e-encaminha, abordando cenários em que o enlace direto entre fonte e destino está disponível para transmitir informação útil. Como uma primeira contribuição, analisa-se o desempenho de dois esquemas baseados no protocolo de retransmissão half-duplex incremental, os quais exploram a diversidade espacial dos enlaces diretos em redes cooperativas e cognitivas multiusuário. A segunda contribuição investiga o impacto de estimativas desatualizadas do canal sobre o mecanismo de seleção de destino para um desses esquemas anteriores, focando-se apenas no aspecto cooperativo da rede, ou seja, desconsiderando-se o uso de compartilhamento espectral. A terceira contribuição estuda o desempenho de redes cooperativas e cognitivas baseadas no modo full-duplex. Para esse cenário, avalia-se o impacto tanto da autointerferência residual, que é inerente ao modo full-duplex, bem como das restrições de potência que caracterizam o compartilhamento de espectro do tipo underlay. Como contribuição final, motivada pelo compromisso entre a perda de eficiência espectral e o problema da autointerferência residual, próprios dos modos half-duplex e full-duplex, respectivamente, propõe-se e analisa-se um esquema de transmissão adaptativo para redes cooperativas e cognitivas, através do qual, antes de cada processo de comunicação, um dos seguintes modos de transmissão é selecionado: retransmissão half-duplex, retransmissão full-duplex ou transmissão direta. Para todos os cenários considerados, expressões analíticas exatas para a probabilidade de outage são obtidas. Adicionalmente, uma análise assintótica é realizada a fim de caracterizar a ordem de diversidade e o comportamento de outage da rede secundária no regime assintótico de alta relação sinal-ruído. Simulações de Monte Carlo validam os resultados analíticos apresentadosAbstract: Underlay spectrum sharing has been proposed as a promising technique to alleviate the problem of spectrum scarcity and underutilization, by enabling secondary (unlicensed) users to concurrently access a licensed band, provided that the resulting interference on the primary (licensed) users remains below a given acceptable level. However, such a technique implies that the transmit power at the secondary network must be constrained, thereby compromising the communication reliability and coverage. To counteract this, cooperative relaying techniques, which provide a new form of spatial diversity, can be exploited as an effective means to boost the performance of the secondary network. Indeed, the joint use of both techniques¿underlay spectrum sharing and cooperative relaying¿in cognitive relaying networks has drawn special attention, since the overall spectral efficiency and the secondary-network performance can be significantly improved. This dissertation comprises four main contributions in this field. In particular, we examine the combined effect of two crucial power constraints on the outage performance of cognitive relaying networks, namely, the maximum tolerable interference power at the primary receiver and the maximum transmit power at the secondary users. We focus on relaying schemes operating under the decode-and-forward protocol, for scenarios in which the direct link between source and destination is available to convey useful information. As a first contribution, we analyze the performance of two incremental half-duplex relaying schemes, which exploit the spatial diversity of the direct links in a multiuser scenario. Our second contribution investigates the impact of outdated channel estimates on the destination-scheduling mechanism of one of those incremental schemes, from the perspective of a cooperative network only, that is, in the absence of spectrum sharing. The third contribution addresses cognitive full-duplex relaying networks. More specifically, we assess the system performance as a function of both the residual self-interference, which is inherent to the full-duplex relaying mode, and the underlay spectrum-sharing power constraints. As a final contribution, driven by the tradeoff between the spectral-efficiency loss and the residual self-interference problem, intrinsic to the half- and full-duplex relaying modes, respectively, we propose and analyze an adaptive transmission scheme whereby, before each communication process, one out of the following transmission modes is selected: half-duplex relaying, full-duplex relaying, or direct transmission. For all the considered scenarios, exact analytical expressions for the outage probability are derived. In addition, an asymptotic analysis is performed to obtain further insights on the diversity order and outage behavior of the secondary network at the high signal-to-noise ratio regime. Monte Carlo simulations corroborate the accuracy of the presented mathematical analysisDoutoradoTelecomunicações e TelemáticaDoutor em Engenharia ElétricaCAPE

    Relay Selection Strategies for Multi-hop Cooperative Networks

    Get PDF
    In this dissertation we consider several relay selection strategies for multi-hop cooperative networks. The relay selection strategies we propose do not require a central controller (CC). Instead, the relay selection is on a hop-by-hop basis. As such, these strategies can be implemented in a distributed manner. Therefore, increasing the number of hops in the network would not increase the complexity or time consumed for the relay selection procedure of each hop. We first investigate the performance of a hop-by-hop relay selection strategy for multi-hop decode-and-forward (DF) cooperative networks. In each relay cluster, relays that successfully receive and decode the message from the previous hop form a decoding set for relaying, and the relay which has the highest signal-to-noise ratio (SNR) link to the next hop is then selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability, and we derive approximations for the ergodic capacity and the effective ergodic capacity of this strategy. Next we propose a novel hop-by-hop relay selection strategy where the relay in the decoding set with the largest number of ``good\u27\u27 channels to the next stage is selected for retransmission. We analyze the performance of this method in terms of end-to-end outage probability in the case of perfect and imperfect channel state information (CSI). We also investigate relay selection strategies in underlay spectrum sharing cognitive relay networks. We consider a two-hop DF cognitive relay network with a constraint on the interference to the primary user. The outage probability of the secondary user and the interference probability at the primary user are analyzed under imperfect CSI scenario. Finally we introduce a hop-by-hop relay selection strategy for underlay spectrum sharing multi-hop relay networks. Relay selection in each stage is only based on the CSI in that hop. It is shown that in terms of outage probability, the performance of this method is nearly optimal

    A Study Of Cooperative Spectrum Sharing Schemes For Internet Of Things Systems

    Get PDF
    The Internet of Things (IoT) has gained much attention in recent years with the massive increase in the number of connected devices. Cognitive Machine-to-Machine (CM2M) communications is a hot research topic in which a cognitive dimension allows M2M networks to overcome the challenges of spectrum scarcity, interference, and green requirements. In this paper, we propose a Generalized Cooperative Spectrum Sharing (GCSS) scheme for M2M communication. Cooperation extends the coverage of wireless networks as well as increasing their throughput while reducing the energy consumption of the connected low power devices. We study the outage performance of the proposed GCSS scheme for M2M system and derive exact expressions for the outage probability. We also analyze the effect of varying transmission powers on the performance of the system

    Physical layer security in 5G and beyond wireless networks enabling technologies

    Get PDF
    Information security has always been a critical concern for wireless communications due to the broadcast nature of the open wireless medium. Commonly, security relies on cryptographic encryption techniques at higher layers to ensure information security. However, traditional cryptographic methods may be inadequate or inappropriate due to novel improvements in the computational power of devices and optimization approaches. Therefore, supplementary techniques are required to secure the transmission data. Physical layer security (PLS) can improve the security of wireless communications by exploiting the characteristics of wireless channels. Therefore, we study the PLS performance in the fifth generation (5G) and beyond wireless networks enabling technologies in this thesis. The thesis consists of three main parts. In the first part, the PLS design and analysis for Device-to-Device (D2D) communication is carried out for several scenarios. More specifically, in this part, we study the underlay relay-aided D2D communications to improve the PLS of the cellular network. We propose a cooperative scheme, whereby the D2D pair, in return for being allowed to share the spectrum band of the cellular network, serves as a friendly jammer using full-duplex (FD) and half-duplex (HD) transmissions and relay selection to degrade the wiretapped signal at an eavesdropper. This part aims to show that spectrum sharing is advantageous for both D2D communications and cellular networks concerning reliability and robustness for the former and PLS enhancement for the latter. Closed-form expressions for the D2D outage probability, the secrecy outage probability (SOP), and the probability of non-zero secrecy capacity (PNSC) are derived to assess the proposed cooperative system model. The results show enhancing the robustness and reliability of D2D communication while simultaneously improving the cellular network’s PLS by generating jamming signals towards the eavesdropper. Furthermore, intensive Monte-Carlo simulations and numerical results are provided to verify the efficiency of the proposed schemes and validate the derived expressions’ accuracy. In the second part, we consider a secure underlay cognitive radio (CR) network in the presence of a primary passive eavesdropper. Herein, a secondary multi-antenna full-duplex destination node acts as a jammer to the primary eavesdropper to improve the PLS of the primary network. In return for this favor, the energy-constrained secondary source gets access to the primary network to transmit its information so long as the interference to the latter is below a certain level. As revealed in our analysis and simulation, the reliability and robustness of the CR network are improved, while the security level of the primary network is enhanced concurrently. Finally, we investigate the PLS design and analysis of reconfigurable intelligent surface (RIS)-aided wireless communication systems in an inband underlay D2D communication and the CR network. An RIS is used to adjust its reflecting elements to enhance the data transmission while improving the PLS concurrently. Furthermore, we investigate the design of active elements in RIS to overcome the double-fading problem introduced in the RISaided link in a wireless communications system. Towards this end, each active RIS element amplifies the reflected incident signal rather than only reflecting it as done in passive RIS modules. As revealed in our analysis and simulation, the use of active elements leads to a drastic reduction in the size of RIS to achieve a given performance level. Furthermore, a practical design for active RIS is proposed

    Hybrid satellite–terrestrial networks toward 6G : key technologies and open issues

    Get PDF
    Future wireless networks will be required to provide more wireless services at higher data rates and with global coverage. However, existing homogeneous wireless networks, such as cellular and satellite networks, may not be able to meet such requirements individually, especially in remote terrain, including seas and mountains. One possible solution is to use diversified wireless networks that can exploit the inter-connectivity between satellites, aerial base stations (BSs), and terrestrial BSs over inter-connected space, ground, and aerial networks. Hence, enabling wireless communication in one integrated network has attracted both the industry and the research fraternities. In this work, we provide a comprehensive survey of the most recent work on hybrid satellite–terrestrial networks (HSTNs), focusing on system architecture, performance analysis, design optimization, and secure communication schemes for different cooperative and cognitive HSTN network architectures. Different key technologies are compared. Based on this comparison, several open issues for future research are discussed

    Performance of a Cognitive Relay Network under AF Relay Selection Scheme with Imperfect Channel Estimation

    Get PDF
    In this paper outage performance of a secondary user (SU) is evaluated under amplify and forward (AF) relay selection scheme with an imperfect channel state information (CSI)while sharing spectrum in an underlay cognitive radio network (CRN). In underlay, the SU coexists with primary user (PU) in the same band provided the interference produced by SU at the PU receiver is below the interference threshold of PU which limits the transmission power of SU and coverage area. Relays help to improve the performance of SU in underlay. However relays are also constrained in transmit power due to interference constraint imposed by PU. Closed form expression of the outage probability of SU with maximum transmit power constraint of relay under imperfect CSI is derived. A scaling factor based power control is used for the SU transmitter and the relay in order to maintain the interference constraint at PU receiver due to imperfect CSI. The impact of different parameters viz. correlation coefficient, channel estimation error, tolerable interference threshold, number of relays and the maximum transmit power constraint of relay on SU performance is investigated. A MATLAB based test bed has also been developed to carry out simulation in order to validate the theoretical result

    Performance enhancement solutions in wireless communication networks

    Get PDF
    In this dissertation thesis, we study the new relaying protocols for different wireless network systems. We analyze and evaluate an efficiency of the transmission in terms of the outage probability over Rayleigh fading channels by mathematical analyses. The theoretical analyses are verified by performing Monte Carlo simulations. First, we study the cooperative relaying in the Two-Way Decode-and-Forward (DF) and multi-relay DF scheme for a secondary system to obtain spectrum access along with a primary system. In particular, we proposed the Two-Way DF scheme with Energy Harvesting, and the Two-Way DF Non-orthogonal Multiple Access (NOMA) scheme with digital network coding. Besides, we also investigate the wireless systems with multi-relay; the best relay selection is presented to optimize the effect of the proposed scheme. The transmission protocols of the proposed schemes EHAF (Energy Harvesting Amplify and Forward) and EHDF (Energy Harvesting Decode and Forward) are compared together in the same environment and in term of outage probability. Hence, with the obtained results, we conclude that the proposed schemes improve the performance of the wireless cooperative relaying systems, particularly their throughput. Second, we focus on investigating the NOMA technology and proposing the optimal solutions (protocols) to advance the data rate and to ensure the Quality of Service (QoS) for the users in the next generation of wireless communications. In this thesis, we propose a Two-Way DF NOMA scheme (called a TWNOMA protocol) in which an intermediate relay helps two source nodes to communicate with each other. Simulation and analysis results show that the proposed protocol TWNOMA is improving the data rate when comparing with a conventional Two-Way scheme using digital network coding (DNC) (called a TWDNC protocol), Two-Way scheme without using DNC (called a TWNDNC protocol) and Two-Way scheme in amplify-and-forward(AF) relay systems (called a TWANC protocol). Finally, we considered the combination of the NOMA and physical layer security (PLS) in the Underlay Cooperative Cognitive Network (UCCN). The best relay selection strategy is investigated, which uses the NOMA and considers the PLS to enhance the transmission efficiency and secrecy of the new generation wireless networks.V této dizertační práci je provedena studie nových přenosových protokolů pro různé bezdrátové síťové systémy. S využitím matematické analýzy jsme analyzovali a vyhodnotili efektivitu přenosu z hlediska pravděpodobnosti výpadku přes Rayleighův kanál. Teoretické analýzy jsou ověřeny provedenými simulacemi metodou Monte Carlo. Nejprve došlo ke studii kooperativního přenosu ve dvoucestném dekóduj-a-předej (Two-Way Decode-and-Forward–TWDF) a vícecestném DF schématu s větším počtem přenosových uzlů pro sekundární systém, kdy takto byl získán přístup ke spektru spolu s primárním systémem. Konkrétně jsme navrhli dvoucestné DF schéma se získáváním energie a dvoucestné DF neortogonální schéma s mnohonásobným přístupem (Non-orthogonal Multiple Access–NOMA) s digitálním síťovým kódováním. Kromě toho rovněž zkoumáme bezdrátové systémy s větším počtem přenosových uzlů, kde je přítomen výběr nejlepšího přenosového uzlu pro optimalizaci efektivnosti navrženého schématu. Přenosové protokoly navržených schémat EHAF (Energy Harvesting Amplify and Forward) a EHDF(Energy Harvesting Decode and Forward) jsou společně porovnány v identickém prostředí z pohledu pravděpodobnosti výpadku. Následně, na základě získaných výsledků, jsme dospěli k závěru, že navržená schémata vylepšují výkonnost bezdrátových kooperativních systémů, konkrétně jejich propustnost. Dále jsme se zaměřili na zkoumání NOMA technologie a navrhli optimální řešení (protokoly) pro urychlení datového přenosu a zajištění QoS v další generaci bezdrátových komunikací. V této práci jsme navrhli dvoucestné DF NOMA schéma (nazýváno jako TWNOMA protokol), ve kterém mezilehlý přenosový uzel napomáhá dvěma zdrojovým uzlům komunikovat mezi sebou. Výsledky simulace a analýzy ukazují, že navržený protokol TWNOMA vylepšuje dosaženou přenosovou rychlost v porovnání s konvenčním dvoucestným schématem používajícím DNC (TWDNC protokol), dvoucestným schématem bez použití DNC (TWNDNC protokol) a dvoucestným schématem v zesil-a-předej (amplify-and-forward) přenosových systémech (TWANC protokol). Nakonec jsme zvážili využití kombinace NOMA a zabezpečení fyzické vrstvy (Physical Layer Security–PLS) v podpůrné kooperativní kognitivní síti (Underlay Cooperative Cognitive Network–UCCN). Zde je zde zkoumán výběr nejlepšího přenosového uzlu, který užívá NOMA a bere v úvahu PLS pro efektivnější přenos a zabezpečení nové generace bezdrátových sítí.440 - Katedra telekomunikační technikyvyhově
    corecore